# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
0ae0aeba16d5d78c08ec0c1dd8dd1f3efb2947a1bd175e79eb9d5a508256165a
Pseudo Output
9e60e98ac2ec6b34125aa8e85feeae185c79aaa36b93b45fbd0f8f31e34f6c75
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
08c2b8e73e6cfc70e66ba030455480813f955fd911bedabe8c9fb22f81739a25
Commitment
3ecd674ad4b62378755c0a5e4f7f1d9ef0b0f5e5a0644b83f747563f40648a5c
Range Proof
672 bytes (Bulletproof)
Memo
30ac0038a2d97fdeae7d853e8b875e7e918197e5af281877336b38c947bb83382fe6975ac7985db069aba13d7fb9be6f61d3e46a3c0a96392f0924998440eac7857635d2febbe2b21334d755761d392013c59c6b327582bcd8840ad8db43df295c35e0208fc504b76bd0b8e3383088093f3753abd134205bf08c4379fbfdc8e1 (encrypted)
Stealth Address
b2e7bbceeae1b3f57e448346f8a2e51a56a1bd9859c49256ff0ced7e15841a25
Commitment
84bd2c0522b87fa5b5a11ecf27dbdae4d4ced331a6440ad93472632bf4b5820a
Range Proof
672 bytes (Bulletproof)
Memo
ac177bd0deed5af0e1706ec373736f8fe4546bc93ed58f88a3b183c8ff0d9c347a6bfcb2b7a0d9c628fb61ea8c35cf73fc30c60e6b37bdc43816dc72c3cfdffdf470d8c345f258f520de36a4422070b7bf6dbdf215f6c9896753996206c901c1fd4c27b1eb6d0e22bfd9925b8313b65831378219fa371fa78dd74a50c8a154a6 (encrypted)
Stealth Address
0cac05de98b8fe5ee4bc827c5fbd2c0c5e4dd0f045f32dfc4202dcb5570b1006
Commitment
aca3f98700e6402fa06d6d75b30099e53b3e692238f561b81f13e8116e0a7f35
Range Proof
672 bytes (Bulletproof)
Memo
36c59e265e587f443fc3c5745114e88b2b4c22cc2e5038954151b4e08793cfae1aa20aa1df27839494e2edd5a3b018b8922010fbad5c11bacb4b49719f7a67d850fdb251435b96be4758eb164018eee484c877f9508255472fcf25fbc3994c9caa8a38d6dbe2ebd1182f97c0394bda9454c7f3d410422ca6abbd25a9ae15fc73 (encrypted)